PEP 675: use semicolon instead of comma (#2330)
This commit is contained in:
parent
49ec965e65
commit
f7bba0160b
|
@ -847,7 +847,7 @@ shell command:
|
|||
subprocess.run(f"echo 'Hello {name}'", shell=True)
|
||||
|
||||
If user-controlled data is included in the command string, the code is
|
||||
vulnerable to "command injection", i.e., an attacker can run malicious
|
||||
vulnerable to "command injection"; i.e., an attacker can run malicious
|
||||
commands. For example, a value of ``' && rm -rf / #`` would result in
|
||||
the following destructive command being run:
|
||||
|
||||
|
|
Loading…
Reference in New Issue